A heap-based buffer overflow flaw was found in the way cpio expandedarchive files. If a user were tricked into expanding a specially-craftedarchive, it could cause the cpio executable to crash or execute arbitrarycode with the privileges of the user running cpio. (CVE-2010-0624)

Red Hat would like to thank Jakob Lell for responsibly reporting thisissue.

Users of cpio are advised to upgrade to this updated package, whichcontains a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously-released erratarelevant to your system have been applied.

This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/docs/DOC-11259